Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Major Phone Scamming Operation Cracked, Eight Detained in Belgium and Netherlands
 

Belgian and Dutch authorities have arrested eight suspects linked to a "phone phishing" gang that targeted victims across at least ten European countries. The operation, coordinated by Europol and Eurojust on December 6, 2024, involved 17 searches in Belgium and the Netherlands, resulting in the seizure of cash, firearms, luxury watches, jewelry, and electronic devices. The suspects, aged 23 to 66 and based mainly in Rotterdam and Almere, impersonated police officers or bank staff to deceive primarily elderly victims into revealing their financial information.

The gang employed various tactics, including phishing messages via email, SMS, and WhatsApp, and approached victims directly under false pretenses. They drained accounts and spent millions on luxury items and vacations. Jan van der Linden of the Rotterdam police noted that while victims suffered significant losses, the suspects flaunted their extravagant lifestyles.

In light of this operation, authorities have...


December 11, 2024 19:02 (on 12/12/24) |  0 | 1 minute read
Link Smart, Share Less
 

When linking apps to your Google, Apple, or Facebook accounts, only grant necessary permissions and avoid over-sharing personal data, as it increases your risk of breaches. Regularly review and revoke access to unused apps and connect only with reputable ones to enhance your security. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


December 11, 2024 16:06 (on 12/12/24) |  0 | QR Ready | 1 minute read
Stay Safe from Sneaky Malware!
 



Malicious software can spread through unexpected messages—no action required! Be cautious, even with messages from friends or family. Don’t click links or download files unless you’re sure they’re safe.

Quick Tips:

  • Be wary of unexpected messages.
  • Verify links before clicking.
  • Use strong email filters.
  • Keep software updated.

Stay smart and secure!


Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


December 10, 2024 17:30 (on 12/11/24) |  0 | QR Ready | 1 minute read
Trust Is Earned, Not Given
 

It's important to adopt a "zero-trust" mindset, treating every device and user as a potential threat, verifying access before sharing sensitive information. This means verifying everyone and everything before granting access to sensitive information, whether it's through secure logins or trusted communication tools. This approach helps minimize risks and ensures your data remains safe from unauthorized access.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


December 10, 2024 17:18 (on 12/11/24) |  0 | QR Ready | 1 minute read
Pair Safe, Stay Safe
 

Keep Bluetooth disabled when not in use and avoid accepting connections from unknown devices. Unauthorized Bluetooth connections can expose your device to security risks, including potential attacks. Always pair only with trusted devices and be cautious when sharing your Bluetooth signal. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


December 9, 2024 17:04 (on 12/10/24) |  0 | QR Ready | 1 minute read
Update or Invade?
 

Always verify that software updates come from trusted sources. While keeping your software up to date is crucial for security, downloading updates from unverified sources can expose your system to malicious software disguised as legitimate updates. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


December 8, 2024 17:02 (on 12/9/24) |  0 | QR Ready | 1 minute read
Be Roar Ready
 

As we prepare for the Roar Event, please stay vigilant about your belongings. keep wallets, ID cards, and devices in a front pocket or secure bag. Be cautious when using public Wi-Fi at the event, use your own mobile data if possible and refrain from discussing work matters in public. By staying mindful of these precautions, we can enjoy the event and avoid potential problems.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


December 5, 2024 16:05 (on 12/6/24) |  0 | QR Ready | 1 minute read
New Phishing Attack Uses Damaged Files to Dodge Antivirus Protection
 

Cybersecurity researchers have warned about a new phishing attack that uses corrupted Microsoft Office files and ZIP archives to bypass email security. According to ANY.RUN, this attack evades antivirus software, prevents files from being analyzed in secure environments (like sandboxes), and gets past Outlook's spam filters, allowing harmful emails to reach your inbox. The attack involves sending emails with intentionally damaged attachments, such as ZIP files or Office documents, which are designed to avoid detection by security tools and trick users into opening them with fake promises of employee benefits or bonuses.

Source: https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html


December 4, 2024 17:22 (on 12/5/24) |  0 | 1 minute read
Scan with Skepticism!
 

Always exercise caution when scanning QR codes, especially those received via email, text, or from unfamiliar sources. Cybercriminals often use QR codes to direct you to malicious websites that could steal your personal information or infect your device with malware. Before scanning, ensure the source is trusted, and whenever possible, verify the URL to ensure its legitimate. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


December 4, 2024 17:12 (on 12/5/24) |  0 | QR Ready | 1 minute read
Triple Threat: The Ultimate Backup Strategy
 



Use the 3-Way Backup Method to safeguard your files:

  1. External Hard Drive – Physical backup
  2. Cloud Storage – Access anywhere
  3. USB Drives – Extra copies

Key Tips:

  • Frequent Updates – Backup regularly
  • Test Restorations – Ensure backups work
  • Encrypt Sensitive Files – Add extra security

Optional: Local Backups – Use a secondary internal drive.

Stay safe with this reliable strategy!


December 3, 2024 16:00 (on 12/4/24) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi